Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2020, Volume 22, Issue 3 doi: 10.15302/J-SSCAE-2019.11.010

Development Roadmap of Polymorphic Intelligence Network Technology Toward 2035

Institute of Information Technology, PLA Strategic Support Force Information Engineering University, Zhengzhou 450002, China

Funding project:中国工程院咨询项目“面向 2035 的‘互联网 +’时代的网络智慧管理战略研究”(2016-ZCQ-04) Received: 2019-05-09 Revised: 2019-08-12 Available online: 2020-05-27

Next Previous

Abstract

The current infrastructure and technology system of the Internet are facing major challenges in terms of intelligence, diversification, personalization, robustness, and efficiency. It is urgent to change the network infrastructure and build a polymorphic definable and intelligent network. This paper studies and judges the development trend of network technologies in China and abroad, proposes the development goal of polymorphic definable and intelligent network, and extracts a list of key cutting-edge technologies for foresight. Based on these, the development roadmap of polymorphic definable and intelligent network in China for 2035 is constructed. China should prospect the research and development of key technologies including network architecture, addressing and routing, full-dimensional definability, network intelligence, and network robust control, and guide the development of relevant industries through the key contents including core chips, products, and systems. Demonstration projects can be deployed to promote the implementation of intelligent network business, including projects concerning information infrastructure, vertical industry network, space–earth integrated network, ubiquitous interconnection of human and things. In addition, this paper proposes some suggestions on the guarantee measures of polymorphic definable and intelligent network in China from the aspects of policy guarantee, scientific research platform support and joint research, international communication expansion, and human resource cultivation and employment.

Figures

Fig. 1

References

[ 1 ] Liang K, Zhao L, Chu X, et al. An integrated architecture for software defined and virtualized radio access networks with fog computing [J]. IEEE Network, 2017, 31(1): 80–87. link1

[ 2 ] Kaiwartya O, Abdullah A H, Cao Y, et al. Internet of vehicles: Motivation, layered architecture, network model, challenges, andfuture aspects [J]. IEEE Access, 2016, 4: 5356–5373. link1

[ 3 ] Naranjo P G V, Pooranian Z, Shojafar M, et al. FOCAN: A fogsupported smart city network architecture for management of applications in the Internet of everything environments [J]. Journal of Parallel and Distributed Computing, 2019, 132: 274–283. link1

[ 4 ] Akshatha N, Rai K H J, Haritha M K, et al. Tactile Internet: Next Generation IoT [C]. Coimbatore: 2019 Third International Conference on Inventive Systems and Control (ICISC), 2019. link1

[ 5 ] Rossini G, Rossi D. Evaluating CCN multi-path interest forwarding strategies [J]. Computer Communications, 2013, 36(7):771–778. link1

[ 6 ] Perry J, Ousterhout A, Balakrishnan H, et al. Fastpass: A centralized “zero-queue” datacenter network [J]. ACM SIGCOMM Computer Communication Review, 2014, 44(4): 307–318. link1

[ 7 ] Zorzi M, Zanella A, Testolin A, et al. Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence [J]. IEEE Access, 2015, 3: 1512–1530. link1

[ 8 ] Xiao S H, He D D, Gong Z B. Deep-Q: Traffic-driven QoS inference using deep generative network [C]. New York: Proceedings of the 2018 Workshop on Network Meets AI & ML,2018. link1

[ 9 ] Wang L Y, Jajodia S, Singhal A, et al. k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing,2014, 11(1): 30–44. link1

[10] Suthaharan S. Big data classification: Problems and challenges in network intrusion prediction with machine learning [J]. ACMSIGMETRICS Performance Evaluation Review, 2014, 41(4):70–73. link1

[11] Shahriar N, Ahmed R, Chowdhury S R, et al. Generalized recovery from node failure in virtual network embedding [J]. IEEE Transactions on Network and Service Management, 2017, 14(2):261–274. link1

[12] Xinhua Net. China will speed up the construction of a new generation of high-speed, mobile, secure and ubiquitous information infrastructure [EB/OL]. (2019-05-17) [2020-08-10].http://www.xinhuanet.com/2019-05/17/c_1124510041.htm. Chinese. link1

[13] Wu J X. Thoughts on the development of novel network technology [J]. Scientia Sinica (Informationis), 2018, 48(8):1102– 1111. Chinese. link1

Related Research